<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; kay</title>
<link>https://blog.intelligencex.org/rss/author/kay</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; kay</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>Incident Report</title>
<link>https://blog.intelligencex.org/incident-report</link>
<guid>https://blog.intelligencex.org/incident-report</guid>
<description><![CDATA[ A Critical tool for minimizing damage , ensuring compliance and improving an organization&#039;s overall security posture. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e645c4f22d2.webp" length="36924" type="image/jpeg"/>
<pubDate>Thu, 25 Sep 2025 13:16:20 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>Incident, Recovery, Response</media:keywords>
</item>

<item>
<title>Cookie Consent</title>
<link>https://blog.intelligencex.org/cookie-consent</link>
<guid>https://blog.intelligencex.org/cookie-consent</guid>
<description><![CDATA[ Cookie consent is the process of getting permission from website visitors to store and access small text files called cookies on their device. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e649139607d.webp" length="80706" type="image/jpeg"/>
<pubDate>Wed, 24 Sep 2025 14:34:15 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>cookie, compliance</media:keywords>
</item>

<item>
<title>Digital Personal Data Protection Act.(DPDPA)</title>
<link>https://blog.intelligencex.org/digital-personal-data-protection-actdpdpa</link>
<guid>https://blog.intelligencex.org/digital-personal-data-protection-actdpdpa</guid>
<description><![CDATA[ India&#039;s first comprehensive law for protecting the digital personal data of its residents. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6491aa3da1.webp" length="70960" type="image/jpeg"/>
<pubDate>Wed, 24 Sep 2025 10:15:00 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance DPDP</media:keywords>
</item>

<item>
<title>Payment Card Industry Data Security Standard (PCI&#45;DSS)</title>
<link>https://blog.intelligencex.org/payment-card-industry-data-security-standard-pci-dss</link>
<guid>https://blog.intelligencex.org/payment-card-industry-data-security-standard-pci-dss</guid>
<description><![CDATA[ PCI DSS compliance is aimed at protecting cardholder information and contains 12 industry requirements and 250+ security controls. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e64ab91e963.webp" length="32272" type="image/jpeg"/>
<pubDate>Mon, 22 Sep 2025 17:40:31 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance, PCI-DSS</media:keywords>
</item>

<item>
<title>NIST Cyber Security Framework</title>
<link>https://blog.intelligencex.org/nist-cyber-security-framework</link>
<guid>https://blog.intelligencex.org/nist-cyber-security-framework</guid>
<description><![CDATA[ The NIST Cybersecurity Framework (CSF) is a set of best practices, standards, and guidelines designed to help organizations manage and reduce cybersecurity risks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e64d9c8e277.webp" length="48944" type="image/jpeg"/>
<pubDate>Fri, 19 Sep 2025 15:05:00 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance, NIST, CSF</media:keywords>
</item>

<item>
<title>Health Insurance Portability and Accountability Act. (HIPAA)</title>
<link>https://blog.intelligencex.org/health-insurance-portability-and-accountability-act-hipaa</link>
<guid>https://blog.intelligencex.org/health-insurance-portability-and-accountability-act-hipaa</guid>
<description><![CDATA[ The U.S federal law introduced in year 1996. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e64f79e6dc4.webp" length="38912" type="image/jpeg"/>
<pubDate>Thu, 18 Sep 2025 13:53:43 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance  HIPAA</media:keywords>
</item>

<item>
<title>ISO/IEC 27001 AND ISMS</title>
<link>https://blog.intelligencex.org/isoiec-27001-and-isms</link>
<guid>https://blog.intelligencex.org/isoiec-27001-and-isms</guid>
<description><![CDATA[ ISO/IEC 27001 is an international standard for establishing , implementing , maintaining and continually improving an &quot;Information Security Management System&quot;(ISMS). ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e748bb6e20b.webp" length="39396" type="image/jpeg"/>
<pubDate>Wed, 17 Sep 2025 18:00:30 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance, ISO27001, ISMS, CIA Triad</media:keywords>
</item>

<item>
<title>Digital accessibility under ADA title III and section 508</title>
<link>https://blog.intelligencex.org/digital-accessibility-under-ada-title-iii-and-section-508</link>
<guid>https://blog.intelligencex.org/digital-accessibility-under-ada-title-iii-and-section-508</guid>
<description><![CDATA[ ADA (Americans with disabilities Act) prohibits discrimination on basis of disability in the activities of  &quot;Places of public accommodation&quot; ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e656f1c8479.webp" length="33136" type="image/jpeg"/>
<pubDate>Tue, 16 Sep 2025 18:29:54 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>ADA, Section 508 compliance</media:keywords>
</item>

<item>
<title>System and organization controls (SOC 2)</title>
<link>https://blog.intelligencex.org/system-and-organization-controls-soc-2</link>
<guid>https://blog.intelligencex.org/system-and-organization-controls-soc-2</guid>
<description><![CDATA[ System and organization control 2 (SOC 2) is a compliance framework developed by the American Institute of Certified Public Accountants (AICPA). It assesses a service organization&#039;s ability to securely manage customer data by evaluating their controls against 5 Trust service criteria. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e652c89b03a.webp" length="56150" type="image/jpeg"/>
<pubDate>Mon, 15 Sep 2025 17:21:08 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>compliance</media:keywords>
</item>

<item>
<title>California Consumer Privacy Act (CCPA)</title>
<link>https://blog.intelligencex.org/california-consumer-privacy-act-ccpa</link>
<guid>https://blog.intelligencex.org/california-consumer-privacy-act-ccpa</guid>
<description><![CDATA[ The California Consumer Privacy Act (CCPA) is a state-level privacy law enacted in California, USA. It grants California residents enhanced rights and control over how their personal data is collected, used, and shared by businesses. Enforced in year 2018. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6212f4539f.webp" length="55348" type="image/jpeg"/>
<pubDate>Fri, 12 Sep 2025 16:13:22 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>CCPA</media:keywords>
</item>

<item>
<title>Personal Information Protection and Electronic Documents Act (PIPEDA)</title>
<link>https://blog.intelligencex.org/personal-information-protection-and-electronic-documents-act-pipeda</link>
<guid>https://blog.intelligencex.org/personal-information-protection-and-electronic-documents-act-pipeda</guid>
<description><![CDATA[ It is a Canadian federal privacy law that governs private sector organizations hoe to collect , use , and disclose personal data during commercial activity. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e64ab91e963.webp" length="32272" type="image/jpeg"/>
<pubDate>Fri, 12 Sep 2025 12:49:54 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>PIPEDA  Principles</media:keywords>
</item>

<item>
<title>General Data Protection Regulation</title>
<link>https://blog.intelligencex.org/GDPR</link>
<guid>https://blog.intelligencex.org/GDPR</guid>
<description><![CDATA[ General Data Protection Regulation (GDPR) is a legal framework introduced by European Union (EU) effective  on 25 May 2018. It governs the collection , processing , storage and protection of  personal data of individual within EU and European Economic Area (EEA). It also applies to organization outside the EU that offer goods or services to , or monitor the behavior of EU data subject. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202509/image_870x580_68c4011b03417.jpg" length="81029" type="image/jpeg"/>
<pubDate>Thu, 11 Sep 2025 18:01:00 +0530</pubDate>
<dc:creator>kay</dc:creator>
<media:keywords>Data subject, Data controller, Data processer, Principles, Rights</media:keywords>
</item>

</channel>
</rss>